US8891767B2 - Method and apparatus for direct counterfactual quantum communication - Google Patents

Method and apparatus for direct counterfactual quantum communication Download PDF

Info

Publication number
US8891767B2
US8891767B2 US13/723,517 US201213723517A US8891767B2 US 8891767 B2 US8891767 B2 US 8891767B2 US 201213723517 A US201213723517 A US 201213723517A US 8891767 B2 US8891767 B2 US 8891767B2
Authority
US
United States
Prior art keywords
path
photon
photons
probability
finding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US13/723,517
Other versions
US20140177837A1 (en
Inventor
Muhammad Suhail Zubairy
Zhenghong Li
Mohammad D. Al-Amri
Hatim A. Salih
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
King Abdulaziz City for Science and Technology KACST
Texas A&M University System
Original Assignee
Texas A&M University System
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Texas A&M University System filed Critical Texas A&M University System
Priority to US13/723,517 priority Critical patent/US8891767B2/en
Assigned to THE TEXAS A&M UNIVERSITY SYSTEM reassignment THE TEXAS A&M UNIVERSITY SYSTEM ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZUBAIRY, MUHAMMAD SUHAIL, Li, Zhenghong
Assigned to KING ABDULAZIZ CITY FOR SCIENCE AND TECHNOLOGY reassignment KING ABDULAZIZ CITY FOR SCIENCE AND TECHNOLOGY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AL-AMRI, MOHAMMAD D., SALIH, HATIM A.
Publication of US20140177837A1 publication Critical patent/US20140177837A1/en
Application granted granted Critical
Publication of US8891767B2 publication Critical patent/US8891767B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04B10/30
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • H04L9/0883

Definitions

  • This invention relates to communications systems. More particularly, it relates to the encrypted communication of information.
  • quantum mechanics has been an enormous successful theory since its inception about a century ago, its conceptual foundation is often a matter of intense debate. Furthermore, several novel phenomena are predicted and observed based on quantum mechanics that appear counterintuitive and are unexplainable in the classical domain. Whole new fields owe their existence to this body of knowledge.
  • One such field is quantum communication.
  • a new mode of communication is used whereby no physical particles travel between sender and receiver.
  • the two most celebrated quantum key distribution (QKD) protocols the BB84 [see, e.g., C. H. Bennett and G. Brassard, 1985, IBM Tech. Discil Bull. 28, 3153 (1985).] and E-91 [see, e.g., A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991)] both utilize basic ingredients from “quantum money” including that of a qubit and the use of non-orthogonal quantum states to encode information. While the security of the BB84 and E-91, as well as a host of other QKD protocols, are guaranteed by the laws of physics, imperfect practical implementation can lead to serious loopholes, leaving them vulnerable to attack [L. Lydersen, C.
  • Gerhardt et al. I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer and V. Makarov, Nature Comm 2, 349 (2011)] have demonstrated in a laboratory setting, using an intercept-resend strategy, how to successfully obtain the secret random key shared by two legitimate parties, Sender and Receiver, in two commercially available QKD systems, without leaving a trace.
  • This effect may be demonstrated using a setup such as the one illustrated in FIG. 1 .
  • the photon “probability wave” will both pass through half-silvered mirror BS 1 (take the route to the right in FIG. 1 ) and be reflected (take the left route). If the observer is not present, the photon will not be absorbed, and so the wave continues along the right route to the second half silvered mirror BS 2 (where it will encounter the left wave and cause self-interference).
  • the system reduces to the basic Mach-Zehnder apparatus with no observer present, in which case constructive interference occurs along the path exiting towards detector D 2 in FIG. 1 and destructive interference occurs along the path exiting towards detector D 1 . Therefore, the detector D 2 will detect a photon, and the detector D 1 will not.
  • the wave function collapses and the photon must either be on the left route or on the right route, but not both.
  • the photon is measured on the route on the right in FIG. 1 , because the observer is present, the photon is absorbed. If the photon is measured on the left route, it will not encounter the observer but since the right route cannot have been taken, there will be no interference effect at BS 2 . The photon on the left route now both passes through BS 2 and is reflected. Upon meeting further observers (detectors D 1 and D 2 ), the wave function collapses again and the photon must be either at detector D 1 or at detector D 2 , but not both. Thus it can be stated that if any photons are detected at detector D 1 , there must have been a detector at the observer position.
  • the presence or absence of an observer could be used to encode information—e.g., the presence of an “observer” could represent a logical 1 and the absence a logical 0.
  • the yield rate of such a system is too low to make this practical. The present invention solves this problem.
  • the logic of counterfactual cryptography is taken to its natural conclusion.
  • quantum Zeno effect [see, e.g., P. G. Kwiat, A. G. White, J. R. Mitchell, O. Nairz, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 83, 4725 (1999)] (which refers to the fact that repeated measurement of an evolving quantum system can inhibit its evolution, leaving it in its initial state, an effect often paraphrased as “a watched kettle never boils”), the efficiency of such interaction-free measurements can be dramatically boosted. In the ideal limit, information may be directly exchanged between a Sender and a Receiver with no physical particles traveling between them, thus achieving direct counterfactual communication.
  • S is the light source
  • C is the optical circulator
  • D 1 and D 2 and D 3 and D 4 are photon detectors
  • PBS stands for a polarizing beam-splitter that only reflects vertically polarized photons (V)
  • SPR stands for switchable polarization rotator
  • PC Pockels cell which determines the polarization state of the transmitted photons
  • SM switchable mirror
  • MR magnetic resonance
  • OD stands for optical delay
  • the two optical paths SM 1 ⁇ MR 1 and SM 1 ⁇ MR B for the first Michelson interferometer correspond to the outer cycle of the chained quantum Zeno effect CQZE (M cycles) for the Mach-Zehnder setup (see FIG. 3 ), while the paths SM 2 ⁇ MR 2 and SM 2 ⁇ MR B for the second Michelson interferometer, correspond to the inner cycle of the CQZE (N cycles).
  • the mirror SM 1(2) may be switched off initially to allow the photon to be transmitted but it may then remain on for M(N) cycles, and may be turned off again after M(N) cycles are completed.
  • OD 1 and OD 2 guarantee that optical distances of different paths of same interferometer exactly match.
  • the Sender (“Bob”) may pass an H photon by turning off his PC reflecting it back, and he may block an H photon by turning on his PC, changing the photon's polarization to V.
  • An optical gate controlled by the Message Receiver (“Alice”) through a classical channel and an OD B in the quantum channel may also be added.
  • the time delay device may be used to protect the Sender's (“Bob's”) bit choices from an Eavesdropper (“Eve”). It will be appreciated by those skilled in the art that the chance of the Receiver's (“Alice's”) photon leaking into the quantum channel is almost zero for large enough M and N.
  • FIG. 1 is a diagram of an experiment of the prior art wherein a photon may be observed on one particular path of a Mach-Zehnder interferometer.
  • FIG. 2 is schematic representation of a communication system according to one embodiment of the invention.
  • FIG. 3 is a schematic representation of a Mach-Zehnder setup that illustrates the working principle of the invention.
  • FIGS. 4 a and 4 b are probability plots for detector activation versus number of cycles.
  • FIG. 5 a is a probability plot of detector activation versus imperfections of the switchable polarization rotators.
  • FIG. 5 b is a probability plot of detector activation versus system noise (defined by the blocking rate of each cycle by any object other than the intended Receiver).
  • FIG. 2 One embodiment of the invention is shown diagrammatically in FIG. 2 .
  • the Receiver's end (“Alice”), it is composed of two parts.
  • the first part consists of a light source S that sends a stream of horizontally polarized (H) photons, detectors (D 1 , D 2 and D 3 ), and a polarizing beam-splitter PBS 0 which only reflects vertically polarized photons V (as do all the PBS in the figure).
  • the second part comprises two tandem Michelson interferometers. It includes two PBSs, two switchable polarization rotators (SPRs), two switchable mirrors (SMs) that can be switched on and off by external means, and two normal mirrors (MRs).
  • SPRs switchable polarization rotators
  • SMs switchable mirrors
  • MRs normal mirrors
  • the Message Sender's setup (“Bob”) also includes two parts.
  • the Sender with the help of Pockel cell PC B , can either switch the polarization of the incoming H photon to a V photon or keep the polarization state H unchanged.
  • the PBS B reflects V photons to a detector D 4 (effectively blocking the communication channel) and allows H photons to be reflected back by the mirror MR B .
  • the second part is a time delay system whose purpose is to defend the Sender against an attack from an Eavesdropper (“Eve”).
  • the Sender can send a stream of logic 0's and 1's by either keeping the polarization state H unchanged (logic 0) or switching it to polarization state V (logic 1).
  • the Sender's choice of logic 0 and 1 leads to a click at detectors D 1 and D 2 , respectively with almost unit probability and with almost no photon in the public channel, thus leading to direct counterfactual communication.
  • This setup may be implemented using current technology. However, before explaining how the setup works, it is useful to discuss an equivalent Mach-Zehnder type setup shown in FIG. 3 which helps to understand the working principle of the invention.
  • BS stands for beam-splitter and SW stands for ideal switches.
  • the photon is accessible to the Eavesdropper.
  • FIG. 3 As shown in the portion of FIG. 3 indicated as (b), by using a chained version of the setup shown in portion (a), direct counterfactual quantum communication can be achieved.
  • beam splitters BSs which have large reflectivity. One is BS M , for M big cycles. The other is BS N for N small cycles within each M cycle.
  • SW ideal switches
  • the Sender allows the Receiver's photon to pass, by switching off all SWs at his end, the initial state
  • the final state is
  • the photonic state after n cycles is
  • the square of the overall factor cos 2(n ⁇ 1) ⁇ represents the probability of having the state
  • the Sender's blocking causes detector D 1 to click, while passing the photon causes detector D 2 to click.
  • the Receiver can read the Sender's bit choices with arbitrarily large efficiency. This is the first step towards direct counterfactual quantum communication.
  • the protocol is not counterfactual.
  • 01 implies the photon passing through the transmission channel with unit probability at Nth cycle, where the risk that the Receiver's signal photon is stolen becomes very high.
  • the protocol is also not counterfactual as the photon travels through the public channel in the case where the Sender does not block the photon.
  • the present invention uses a protocol that leads not only to direct communication between the Sender and the Receiver but is also counterfactual.
  • a chained version of the quantum Zeno effect (CQZE) is used, as shown in FIG. 3( b ).
  • detector D 2 clicks. Again the counterfactuality is ensured by a click at D 2 as any photon in the public channel would be absorbed by the blocking device and would not be available for detection at D 2 .
  • FIGS. 4 a and 4 b the probabilities P 1 and P 2 (which are the probabilities of D 1 and D 2 clicking, respectively) are plotted using the above recursion relations.
  • P 1 and P 2 are plotted against different number of cycles M and N for the Sender unblocking the Receiver's photon ( FIG. 4 a ) and the Sender obstructing the Receiver's photon ( FIG. 4 b ). It may clearly be seen that P 1 is above 0.90 for M>25 and is independent of N. However, a value of P 2 above 0.90 requires not only M>25 but a much larger value of N.
  • the initial photon emitted by the light source is
  • H . Since the signal photon passes through SMs twice each cycle, one may set ⁇ 1(2) ⁇ 4M(N). It is not difficult to see that, if the Sender blocks the photon, detector D 2 clicks. Also, if the Sender passes the photon, detector D 1 clicks.
  • the effect of the imperfections of the system and the noise in the transmission channel on the performance of the counterfactual communication are considered.
  • the imperfections There are two kinds of imperfections. The first one only affects the efficiency of the communication, but does not cause the measurement errors.
  • the imperfection coming from the sensitivity of the detectors D 1 , D 2 and D 3 is an example of this imperfection. If the sensitivity of these detectors is ⁇ , then the efficiency of the communication also reduces to ⁇ .
  • the second kind of imperfection which mainly comes from the switchable polarization rotators (SPRs), results in the measurement errors. During each cycle, SPRs should rotate the signal photon with a certain angle, but in practical situations there can be a slight error in the angle.
  • SPRs switchable polarization rotators
  • FIG. 5 b is a plot of the probability of D 1 clicking (the Sender passing the photon) with different noise B defined by the blocking rate of each cycle by any object except the Sender.
  • switchable mirrors are also very important.
  • the distance between the Sender and the Receiver is L.
  • the control time of these switchable mirrors should be less than 2 L/c 0 (c 0 being the light speed).
  • the first is an intercept-resend attack whereby for the case where the Sender blocks the quantum channel the Eavesdropper unblocks the channel by replacing the Sender's setup, ideally at the last outer cycles.
  • the Eavesdropper measures and resends upon detection.
  • N and M are kept secret by the Receiver, it can be proved that the Eavesdropper cannot, on average, intercept the Receiver's photons and resend them without being detected herself. It is not difficult to see, without the knowledge of N and M, the random replacement for the Sender's setup will decrease the probability the Eavesdropper catching the Receiver's test photon. Meanwhile, the chance D 3 clicking will increase anomalously.
  • the second attack by the Eavesdropper involves using a similar counterfactual setup (avoiding clicking D 4 ) to read out the Sender's information. Since the Sender cannot distinguish the source of the photon, the Eavesdropper can attack the Sender's setup almost whenever she wants to. This attack can be avoided by means of the time delay setup shown in FIG. 2 .
  • the red dashed line is a classical channel used by the Receiver to control an optical gate positioned before the Sender's setup. The component of the Receiver's photon (with almost zero probability amplitude) can pass through it only if the gate is open. A long optical delay (OD 3 ) is added into the transmission path before the gate.
  • the Eavesdropper Since she does not know when the Receiver will send her photon component in, the Eavesdropper needs to measure the control signals in the classical channel in order to get gate information. Suppose the Eavesdropper can catch the control signal and resend it straight on. She immediately starts her counterfactual attack on the Sender. It takes T′+ ⁇ time for her photon component to reach the gate. However, the gate opening time is from T′ to T′+ ⁇ . Thus if ⁇ >> ⁇ t, it is impossible for the Eavesdropper's photon to get into the Sender's setup. For the next gate opening time (the next photon cycle), the Receiver can still change the optical distance in her setup. This means the Eavesdropper cannot know the correct gate opening time.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optics & Photonics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Optical Communication System (AREA)
  • Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)

Abstract

It has long been assumed in physics that for information to travel in empty space between two parties (the Sender and the Receiver), “physically real” entities have to travel between the parties. The recently discovered technique of interaction-free measurement—wherein the presence of an object is inferred without the object directly interacting with the interrogating light—has caused this basic assumption to be questioned. This technique has found application in quantum key distribution in the form of counterfactual quantum key distribution—albeit with limited efficiency. In the present invention, using the “chained” quantum Zeno effect, this logic is taken to its natural conclusion and, in the ideal limit, information can be transferred between the Sender and the Receiver without any physical particles whatsoever traveling between them.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
None
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
Not Applicable
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to communications systems. More particularly, it relates to the encrypted communication of information.
2. Description of the Related Art including Information Disclosed Under 37 CFR 1.97 and 1.98
Although quantum mechanics has been an immensely successful theory since its inception about a century ago, its conceptual foundation is often a matter of intense debate. Furthermore, several novel phenomena are predicted and observed based on quantum mechanics that appear counterintuitive and are unexplainable in the classical domain. Whole new fields owe their existence to this body of knowledge. One such field is quantum communication. In the present invention, a new mode of communication is used whereby no physical particles travel between sender and receiver.
In 1970, the idea of “quantum money” [S. Wiesner, SIGACT News 15, 78 (1983)]—money that cannot be forged—came to light, effectively kick-starting the field of quantum information. The idea, perhaps too advanced for its time, rested on the conjecture that quantum states cannot be faithfully copied, was later proved as the no-cloning theorem [see, e.g., W. K. Wootters and W. H. Zurek, Nature 299, 802 (1982)]. Moreover, the mere act of measurement of an unknown quantum state alters it irreversibly. While “quantum money” has not turned out to be practical, the basic concept found direct application in cryptography [see, e.g., S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Fourth Estate, London 1999)], or more precisely in quantum key distribution (QKD) [see, e.g., C. H. Bennett, and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, (IEEE, New York), 175 (1984)], promising unconditionally secure communication.
The two most celebrated quantum key distribution (QKD) protocols, the BB84 [see, e.g., C. H. Bennett and G. Brassard, 1985, IBM Tech. Discil Bull. 28, 3153 (1985).] and E-91 [see, e.g., A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991)] both utilize basic ingredients from “quantum money” including that of a qubit and the use of non-orthogonal quantum states to encode information. While the security of the BB84 and E-91, as well as a host of other QKD protocols, are guaranteed by the laws of physics, imperfect practical implementation can lead to serious loopholes, leaving them vulnerable to attack [L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar and V. Makarov, Nature Photon. 4, 686-689 (2010)]. For example, Gerhardt et al. [I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer and V. Makarov, Nature Comm 2, 349 (2011)] have demonstrated in a laboratory setting, using an intercept-resend strategy, how to successfully obtain the secret random key shared by two legitimate parties, Sender and Receiver, in two commercially available QKD systems, without leaving a trace.
Such potentially devastating attacks provide strong motivation for new approaches in QKD including, but not limited to counterfactual QKD, first proposed by Noh [T.-G. Noh, Phys. Rev. Lett. 103, 230501 (2009)]. Although the Noh09 protocol was not the first to make use of interaction-free measurements in QKD, it was the first to employ counterfactuality, meaning that no information-carrying qubits travel between the Sender and the Receiver. The Noh09 protocol has been realized experimentally [see, e.g., M. Ren, G. Wu, E. Wu, and H. Zeng, Laser Phys. 21, 755 (2011)]. The drawback of this protocol is that, even in the ideal case only 12.5% of the photons used are retained, the rest are discarded.
The basic idea of interaction-free measurement [see, e.g., A. C. Elitzur, and L. Vaidman, Found. Phys. 23, 987 (1993)] (or quantum interrogation), central to both counterfactual cryptography and counterfactual computation [see, e.g., R. Jozsa, in Lecture Notes in Computer Science, edited by C. P. Williams (Springer-Verlag, Berlin), 1509, 103 (1999)], makes use of the fact that the presence of an obstructing object, acting as a measuring device, inside an interferometer setting, destroys interference even if no particle is absorbed by the object. This has the surprising consequence that sometimes the presence of such an object can be inferred without the object directly interacting with any (interrogating) particles.
This effect may be demonstrated using a setup such as the one illustrated in FIG. 1.
When a photon's state is non-deterministically altered, such as interacting with a half-silvered mirror where it non-deterministically passes through or is reflected, the photon undergoes quantum superposition, whereby it takes on all possible states and can interact with itself. This phenomenon continues until an “observer” (detector) interacts with it, causing the wave function to collapse and returning the photon to a deterministic state.
After being emitted, the photon “probability wave” will both pass through half-silvered mirror BS1 (take the route to the right in FIG. 1) and be reflected (take the left route). If the observer is not present, the photon will not be absorbed, and so the wave continues along the right route to the second half silvered mirror BS2 (where it will encounter the left wave and cause self-interference).
The system reduces to the basic Mach-Zehnder apparatus with no observer present, in which case constructive interference occurs along the path exiting towards detector D2 in FIG. 1 and destructive interference occurs along the path exiting towards detector D1. Therefore, the detector D2 will detect a photon, and the detector D1 will not.
If the observer is present, upon meeting the observer the wave function collapses and the photon must either be on the left route or on the right route, but not both.
If the photon is measured on the route on the right in FIG. 1, because the observer is present, the photon is absorbed. If the photon is measured on the left route, it will not encounter the observer but since the right route cannot have been taken, there will be no interference effect at BS2. The photon on the left route now both passes through BS2 and is reflected. Upon meeting further observers (detectors D1 and D2), the wave function collapses again and the photon must be either at detector D1 or at detector D2, but not both. Thus it can be stated that if any photons are detected at detector D1, there must have been a detector at the observer position.
One might suppose that the presence or absence of an observer could be used to encode information—e.g., the presence of an “observer” could represent a logical 1 and the absence a logical 0. However, the yield rate of such a system is too low to make this practical. The present invention solves this problem.
In the present invention, the logic of counterfactual cryptography is taken to its natural conclusion. Using the quantum Zeno effect [see, e.g., P. G. Kwiat, A. G. White, J. R. Mitchell, O. Nairz, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 83, 4725 (1999)] (which refers to the fact that repeated measurement of an evolving quantum system can inhibit its evolution, leaving it in its initial state, an effect often paraphrased as “a watched kettle never boils”), the efficiency of such interaction-free measurements can be dramatically boosted. In the ideal limit, information may be directly exchanged between a Sender and a Receiver with no physical particles traveling between them, thus achieving direct counterfactual communication.
BRIEF SUMMARY OF THE INVENTION
It has long been assumed in physics that for information to travel in empty space between two parties (the Sender and the Receiver), “physically real” entities have to travel between the parties. The recently discovered technique of interaction-free measurement wherein the presence of an object is inferred without the object directly interacting with the interrogating light—has caused this basic assumption to be questioned. This technique has found application in quantum key distribution in the form of counterfactual quantum key distribution—albeit with limited efficiency. In the present invention, using the “chained” quantum Zeno effect, this logic is taken to its natural conclusion and, in the ideal limit, information can be transferred between a Sender and a Receiver without any physical particles whatsoever traveling between them.
Referring now to FIG. 2 wherein S is the light source, C is the optical circulator, D1 and D2 and D3 and D4 are photon detectors, PBS stands for a polarizing beam-splitter that only reflects vertically polarized photons (V), SPR stands for switchable polarization rotator, PC stands for Pockels cell which determines the polarization state of the transmitted photons, SM stands for switchable mirror, MR stands for a normal mirror and OD stands for optical delay, it should be noted that only horizontally polarized photons (H) will be sent into the tandem Michelson interferometers. The two optical paths SM1→MR1 and SM1→MRB for the first Michelson interferometer correspond to the outer cycle of the chained quantum Zeno effect CQZE (M cycles) for the Mach-Zehnder setup (see FIG. 3), while the paths SM2→MR2 and SM2→MRB for the second Michelson interferometer, correspond to the inner cycle of the CQZE (N cycles). The mirror SM1(2) may be switched off initially to allow the photon to be transmitted but it may then remain on for M(N) cycles, and may be turned off again after M(N) cycles are completed. Here, SPR1(2) may rotate the polarization by a small angle βM(N)=π4M(N) (for each cycle, the photon passes SPR twice), i.e., |H
Figure US08891767-20141118-P00001
evolves to cos βM(N)|H
Figure US08891767-20141118-P00001
+sin βM(N)|V
Figure US08891767-20141118-P00001
and |V
Figure US08891767-20141118-P00001
evolves to cos βM(N)|V
Figure US08891767-20141118-P00001
−sin βM(N)|H
Figure US08891767-20141118-P00001
. OD1 and OD2 guarantee that optical distances of different paths of same interferometer exactly match. At the Message Sender's end, the Sender (“Bob”) may pass an H photon by turning off his PC reflecting it back, and he may block an H photon by turning on his PC, changing the photon's polarization to V. An optical gate controlled by the Message Receiver (“Alice”) through a classical channel and an ODB in the quantum channel may also be added. The time delay device may be used to protect the Sender's (“Bob's”) bit choices from an Eavesdropper (“Eve”). It will be appreciated by those skilled in the art that the chance of the Receiver's (“Alice's”) photon leaking into the quantum channel is almost zero for large enough M and N.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)
FIG. 1 is a diagram of an experiment of the prior art wherein a photon may be observed on one particular path of a Mach-Zehnder interferometer.
FIG. 2 is schematic representation of a communication system according to one embodiment of the invention.
FIG. 3 is a schematic representation of a Mach-Zehnder setup that illustrates the working principle of the invention.
FIGS. 4 a and 4 b are probability plots for detector activation versus number of cycles.
FIG. 5 a is a probability plot of detector activation versus imperfections of the switchable polarization rotators.
FIG. 5 b is a probability plot of detector activation versus system noise (defined by the blocking rate of each cycle by any object other than the intended Receiver).
DETAILED DESCRIPTION OF THE INVENTION
One embodiment of the invention is shown diagrammatically in FIG. 2. At the Receiver's end (“Alice”), it is composed of two parts. The first part consists of a light source S that sends a stream of horizontally polarized (H) photons, detectors (D1, D2 and D3), and a polarizing beam-splitter PBS0 which only reflects vertically polarized photons V (as do all the PBS in the figure). The second part comprises two tandem Michelson interferometers. It includes two PBSs, two switchable polarization rotators (SPRs), two switchable mirrors (SMs) that can be switched on and off by external means, and two normal mirrors (MRs). This part of the setup allows the signal photon to have a very large probability of staying at the Receiver's end. On the other side, the Message Sender's setup (“Bob”) also includes two parts. In the first part, the Sender, with the help of Pockel cell PCB, can either switch the polarization of the incoming H photon to a V photon or keep the polarization state H unchanged. The PBSB reflects V photons to a detector D4 (effectively blocking the communication channel) and allows H photons to be reflected back by the mirror MRB. The second part is a time delay system whose purpose is to defend the Sender against an attack from an Eavesdropper (“Eve”). The Sender can send a stream of logic 0's and 1's by either keeping the polarization state H unchanged (logic 0) or switching it to polarization state V (logic 1). The Sender's choice of logic 0 and 1 leads to a click at detectors D1 and D2, respectively with almost unit probability and with almost no photon in the public channel, thus leading to direct counterfactual communication.
This setup may be implemented using current technology. However, before explaining how the setup works, it is useful to discuss an equivalent Mach-Zehnder type setup shown in FIG. 3 which helps to understand the working principle of the invention. In the Mach-Zehnder setup illustrated in FIG. 3, BS stands for beam-splitter and SW stands for ideal switches. In the transmission channel, the photon is accessible to the Eavesdropper. As shown in the portion of FIG. 3 indicated as (b), by using a chained version of the setup shown in portion (a), direct counterfactual quantum communication can be achieved. There are two kinds of beam splitters BSs, which have large reflectivity. One is BSM, for M big cycles. The other is BSN for N small cycles within each M cycle. There are a total of M×N cycles for one signal. As discussed below, the probability of finding a signal photon in the transmission channel is nearly zero. Clicks at D1 or D2 reveal to the Receiver (“Alice”) the Sender's (“Bob's”) bit choices.
Initially a photon is sent by the Receiver from the left such that the input state (before the top beam-splitter) is |H
Figure US08891767-20141118-P00001
. The state transformation at the beam-splitters may be described by
|10
Figure US08891767-20141118-P00001
→cos θ|10
Figure US08891767-20141118-P00001
+sin θ|01
Figure US08891767-20141118-P00001
,|01
Figure US08891767-20141118-P00001
→cos θ|01
Figure US08891767-20141118-P00001
−sin θ|10
Figure US08891767-20141118-P00001
  (1)
where cos θ=√{square root over (R)} with R being the reflectivity of the BS.
At the Sender's end, ideal switches (SW) allow the Sender to pass the photon (logic 0) or to block it (logic 1).
There are two steps to achieve the direct counterfactual communication. One basic idea is utilizing the quantum Zeno effect, which refers to the fact that repeated measurement of a gradually evolving quantum state leaves it unchanged.
In the first step [see FIG. 3( a)], a large number (N) of beam-splitters with a very small transmissivity, i.e., θ=π/2N are used. When the Sender allows the Receiver's photon to pass, by switching off all SWs at his end, the initial state |10
Figure US08891767-20141118-P00001
evolves coherently. After n cycles, the state of the photon can be written as
|10
Figure US08891767-20141118-P00001
→cos nθ|10
Figure US08891767-20141118-P00001
+sin nθ|01
Figure US08891767-20141118-P00001
  (2)
Thus, at the end of N cycles (n=N), the final state is |01
Figure US08891767-20141118-P00001
and the detector D2 clicks. On the other hand, if the Sender blocks the photon by switching on all SWs, the photonic state after n cycles is
|10
Figure US08891767-20141118-P00001
→cosn−1θ(cos θ|10
Figure US08891767-20141118-P00001
+sin θ|01
Figure US08891767-20141118-P00001
)≈|10
Figure US08891767-20141118-P00001
  (3)
where N is assumed to be large and cosN θ≈1. Here the square of the overall factor cos2(n−1)θ represents the probability of having the state |10
Figure US08891767-20141118-P00001
after n−1 cycles. In this case the detector D1 clicks.
As a result, the Sender's blocking causes detector D1 to click, while passing the photon causes detector D2 to click. This means that, in the ideal limit, the Receiver can read the Sender's bit choices with arbitrarily large efficiency. This is the first step towards direct counterfactual quantum communication.
Although the Mach-Zehnder set-up, shown in FIG. 3( a), enables direct communication, the protocol is not counterfactual. In the case when the Sender does not block, the photon's final state |01
Figure US08891767-20141118-P00001
implies the photon passing through the transmission channel with unit probability at Nth cycle, where the risk that the Receiver's signal photon is stolen becomes very high. The protocol is also not counterfactual as the photon travels through the public channel in the case where the Sender does not block the photon.
The present invention uses a protocol that leads not only to direct communication between the Sender and the Receiver but is also counterfactual. A chained version of the quantum Zeno effect (CQZE) is used, as shown in FIG. 3( b). The signal photon passes through “M” big cycles separated by BSMs with θM=π/3M. For the m-th cycle (m≦M), there are “N” beam-splitters BSNs with θN=π/2N.
As a result of beam-splitter transformations, now, there exist three photon states |i,j,k
Figure US08891767-20141118-P00001
; where |i
Figure US08891767-20141118-P00001
, |j
Figure US08891767-20141118-P00001
and |k
Figure US08891767-20141118-P00001
correspond to the photon states at the left hand-side arms of the outer chain, at the left hand-side arms of the inner chain, and at the right hand-side arms of the inner chain, respectively.
By using the results shown in Equations (2) and (3), it is easy to see that if the Sender passes the Receiver's photon, for the m-th big cycle, one would have,
010 -> cos n θ N 010 + sin n θ N 001 -> n = N 001 ( 4 )
It may be assumed that initially the Receiver sends a single photon as shown in FIG. 3( b) where all unused ports are in the vacuum state. The initial state of the total system is |110
Figure US08891767-20141118-P00001
. We can see the evolution by including results from Equations (2) and (3).
First, consider the case when the Sender (“Bob”) does not block at any stage (logic 0). After the m-th cycle, the resulting photon state is
100 -> cos m - 1 θ M ( cos θ M 100 + sin θ M 010 ) -> m = M 100 ( 5 )
It is clear that after M big cycles and N small cycles detector D1 clicks. A click at the detector D1 ensures counterfactuality as any photon in the public channel would lead to a click at one of the detectors D3 [see Eq. (2)]. The probability of click at D1 is obtained by collecting all the contributions that are reflected from all the beam-splitters BSm's and is given by P1=cos2MθM.
On the other hand, if the Receiver blocks throughout (logic 1), one would have (for the m-th cycle)
010 -> cos n - 1 θ N ( cos θ N 010 + sin θ N 001 -> n = N 010 ( 6 )
where it is assumed N>>1. After the m-th cycle, the photon state is
100 -> cos m θ N 100 + sin m θ M 010 -> m = M 010 ( 7 )
Thus, after M big cycles and N small cycles, detector D2 clicks. Again the counterfactuality is ensured by a click at D2 as any photon in the public channel would be absorbed by the blocking device and would not be available for detection at D2. The probability of click at the detector D2 is given by P2=|y{M,0}|2 where y{M,0} can be obtained from the recursion relations xm+1=aMxm−bMy{m,N}, y{m+1,0}=bMxm+aMy{m,N}, y{m,n}=aNy{m,n−1}=aNy{m,n−1}−bNz{m,n−1} and z{m,n}=c(bNy{m,n−1}+aNz{m,n−1}) where aN(M)=cos θN(M), bN(M)=sin θN(M), and c=0 with x1=aM, y{1,0}=bM and z{m,0}=0. Obviously, if c=1, one can get the probability D1 clicking (P1=|xM|2) for the case the Sender encoding “0”.
In FIGS. 4 a and 4 b the probabilities P1 and P2 (which are the probabilities of D1 and D2 clicking, respectively) are plotted using the above recursion relations. P1 and P2 are plotted against different number of cycles M and N for the Sender unblocking the Receiver's photon (FIG. 4 a) and the Sender obstructing the Receiver's photon (FIG. 4 b). It may clearly be seen that P1 is above 0.90 for M>25 and is independent of N. However, a value of P2 above 0.90 requires not only M>25 but a much larger value of N. Numerical estimates indicate (P1=0.906, P2=0.912) for (M=25, N=320); (P1=0.952, P2=0.953) for (M=50, N=1250); and (P1=0.984, P2=0.982) for (M=150, N=10000). This shows that a perfect counterfactuality is possible, albeit for large values of M and N. This may be complicated for the Mach-Zehnder setup described so far. However a Michelson interferometer-based implementation offers significant practical advantages. Thus, after elucidating the essential features of this direct counterfactual quantum communication protocol, we revert to a discussion of the Michelson-type configuration shown in FIG. 2. This allows a better practical realization of the protocol, with a massive saving of resources.
Here, the function of BS is replaced by the combination of PBS and SPR. Assume the state of an H photon is |H
Figure US08891767-20141118-P00001
, and the state of a V photon is |V
Figure US08891767-20141118-P00001
. Then, each time the photon passes through one SPR, the polarization evolves as follows |H
Figure US08891767-20141118-P00001
→cos/βi|H
Figure US08891767-20141118-P00001
+sin βi|V
Figure US08891767-20141118-P00001
and |V
Figure US08891767-20141118-P00001
→cos βi|V
Figure US08891767-20141118-P00001
−sin βi|H
Figure US08891767-20141118-P00001
, where β represents the rotation angle with the subscript i=1,2 corresponding to different SPRs. The mirror SM1(2) is switched off initially to allow the photon to be transmitted but it remains on during M(N) cycles and is turned off again after M(N) cycles are completed. The initial photon emitted by the light source is |H
Figure US08891767-20141118-P00001
. Since the signal photon passes through SMs twice each cycle, one may set β1(2)=π4M(N). It is not difficult to see that, if the Sender blocks the photon, detector D2 clicks. Also, if the Sender passes the photon, detector D1 clicks.
Next, the effect of the imperfections of the system and the noise in the transmission channel on the performance of the counterfactual communication are considered. There are two kinds of imperfections. The first one only affects the efficiency of the communication, but does not cause the measurement errors. The imperfection coming from the sensitivity of the detectors D1, D2 and D3 is an example of this imperfection. If the sensitivity of these detectors is η, then the efficiency of the communication also reduces to η. However, the second kind of imperfection, which mainly comes from the switchable polarization rotators (SPRs), results in the measurement errors. During each cycle, SPRs should rotate the signal photon with a certain angle, but in practical situations there can be a slight error in the angle. It may be supposed that the error for the SPR in the inner cycle is ΔθN=sNN/N), namely, the photon state is rotated with an additional angle sNθN after N cycles. The corresponding coefficient for the error of the SPR in the outer cycle is sM. Their influence may be estimated numerically by replacing θN(M) with θN(M)+Δθn(M) for fixed N and M in the recursion relations given above. FIG. 5 a is a plot of the detector D1 and D2 clicking rates for different values of s describing the imperfection of the switchable polarization rotators (setting s=sN=sM). The red lines are plotted for the case M=50, N=1250. The black lines are plotted for the case M=25, N=320. It is clear that the performance is still good if the factor s is less than two.
Another source of noise results when the photon in the transmission channel is blocked by some object other than Message Sender's. The noise rate may be defined as B. This represents the signal being blocked in each cycle by any object other than Message Sender's. It is easy to see if the Sender chooses to block his path, the result at the Receiver's end does not change. For the case when the Sender allows the photon component to be reflected, the result does not change appreciably if there is blocking only in one cycle. However, the noise may cause a problem if the blocking takes place in multiple cycles. FIG. 5 b is a plot of the probability of D1 clicking (the Sender passing the photon) with different noise B defined by the blocking rate of each cycle by any object except the Sender. The red lines are plotted for the case M=50, N=1250. The black lines are plotted for the case M=25, N=320. To simulate the noise, random numbers between 0 to 1 may be created each time the photon component passes through the transmission channel. If the number is less than B, the signal photon may be regarded as being blocked out of the communication system (Set c=0 for that cycle, otherwise c=1). The figure shows that the blocking rate B should be suppressed under 0.2%.
It should be noted that the time control of switchable mirrors (SMs) is also very important. Suppose the distance between the Sender and the Receiver is L. The control time of these switchable mirrors should be less than 2 L/c0 (c0 being the light speed).
The emphasis here is on the counterfactual nature of direct communication that brings about the essential difference between classical and quantum communication. The secure issue is important but also very complicated. Here for simplicity, some possible attacks by an eavesdropper (“Eve” in the drawing figures) and how to overcome them are discussed.
The first is an intercept-resend attack whereby for the case where the Sender blocks the quantum channel the Eavesdropper unblocks the channel by replacing the Sender's setup, ideally at the last outer cycles. The Eavesdropper then measures and resends upon detection. However, provided the number of cycles N and M are kept secret by the Receiver, it can be proved that the Eavesdropper cannot, on average, intercept the Receiver's photons and resend them without being detected herself. It is not difficult to see, without the knowledge of N and M, the random replacement for the Sender's setup will decrease the probability the Eavesdropper catching the Receiver's test photon. Meanwhile, the chance D3 clicking will increase anomalously.
The second attack by the Eavesdropper involves using a similar counterfactual setup (avoiding clicking D4) to read out the Sender's information. Since the Sender cannot distinguish the source of the photon, the Eavesdropper can attack the Sender's setup almost whenever she wants to. This attack can be avoided by means of the time delay setup shown in FIG. 2. The red dashed line is a classical channel used by the Receiver to control an optical gate positioned before the Sender's setup. The component of the Receiver's photon (with almost zero probability amplitude) can pass through it only if the gate is open. A long optical delay (OD3) is added into the transmission path before the gate. It takes time T for the photon component to go through OD3, which means that the signal in the classical channel is always faster than that in the quantum channel with a time difference τ. If the Receiver needs the gate opened in order to pass her photon component, the control signal in the classical channel should be delayed by time τ. Suppose that it takes time T for the photon component to pass through the quantum channel. The transmission time from the Eavesdropper to the Sender is T′ (assuming the Eavesdropper knows exactly the distance between her and the Sender). The opening time for the gate will depend on how much time the photon spends in the Receiver's setup, plus instrument error. Its maximum value is designated as Δt. Now, the Eavesdropper has to utilize this time Δt. Since she does not know when the Receiver will send her photon component in, the Eavesdropper needs to measure the control signals in the classical channel in order to get gate information. Suppose the Eavesdropper can catch the control signal and resend it straight on. She immediately starts her counterfactual attack on the Sender. It takes T′+τ time for her photon component to reach the gate. However, the gate opening time is from T′ to T′+Δτ. Thus if τ>>Δt, it is impossible for the Eavesdropper's photon to get into the Sender's setup. For the next gate opening time (the next photon cycle), the Receiver can still change the optical distance in her setup. This means the Eavesdropper cannot know the correct gate opening time.
There are two more important issues to be addressed. That is to see what happens when the Eavesdropper sends a fake control photon into the public channel, or continuously attacks the gate counterfactually (avoiding clicking D4). In the former case, the Sender and the Receiver expose this kind of attack simply by publicizing their photons' departure and arrival times. For the latter case, since counterfactual attack needs the Eavesdropper's test photon bouncing between the Eavesdropper and the Sender a sufficiently large number of times, if the gate opening time can be made random and controlled by the Receiver, the Eavesdropper's test photon may pass through the gate for one time, but it is impossible for it passing through in each following cycles. Thus, it would not be possible for the Eavesdropper to avoid her photon being blocked by the gate.
Two kinds of attacks by the Eavesdropper have been discussed. Both can be defended successfully by (1) adding a gate at the Sender's end that is controlled by the Receiver, (2) by choosing N or M randomly by the Receiver before the communication (during the communication these numbers could be fixed), and (3) by controlling the optical path length of each cycle by the Receiver. Of course these features take away from the simplicity and the beauty of the invention but they may be required if one insists on security.
Although particular embodiments of the present invention have been shown and described, they are not intended to limit what this patent covers. One skilled in the art will understand that various changes and modifications may be made without departing from the scope of the present invention as literally and equivalently covered by the following claims.

Claims (8)

What is claimed is:
1. An apparatus for direct counterfactual quantum communication comprising:
(a) a photon source emitting photons in a first state;
(b) means for transmitting a photon in a first state to a first beam splitter;
(c) a first beam splitter configured to randomly cause the photon to take either a first path or a second path;
(d) a second beam splitter configured to randomly split a photon on the second path into a third path and a fourth path;
(e) means for selectively blocking a photon on the fourth path;
(f) a third beam splitter configured to combine photons on the third path with unblocked photons on the fourth path and pass photons into a fifth path and a sixth path such that, if constructive interference occurs, the probability of finding a photon on the sixth path is greater that if constructive interference does not occur;
(g) means for blocking photons on the sixth path if photons were blocked on the fourth path;
(h) a fourth beam splitter configured to combine photons on the fifth path with unblocked photons on the sixth path and pass photons into a seventh path and an eighth path such that, if constructive interference occurs, the probability of finding a photon in the eighth path is greater than finding a photon in the sixth path and if no constructive interference occurs the probability of finding a photon in the eighth path is approximately equal to the probability of finding a photon in the sixth path;
(i) means for blocking photons on the eighth path if photons were blocked on the fourth path;
(j) a fifth beam splitter configured to combine photons on the seventh path with unblocked photons on the eighth path and pass into a ninth path and a tenth path such that, if constructive interference occurs, the probability of finding a photon in the tenth path is equal to the probability finding a photon in the second path;
(k) means for detecting any photons on the tenth path;
(l) a sixth beam splitter configured to combine photons on the ninth path with photons on the first path and pass photons into an eleventh path and a twelfth path such that, if constructive interference occurs, the probability of finding a photon in the twelfth path is greater than the probability of finding a photon in the twelfth path if constructive interference does not occur;
(m) at least one additional iteration of elements (b) through (l), above, configured to combine any photons on the eleventh path with unblocked photons on the thirteenth path in a seventh beam splitter that passes photons into a fourteenth path and a fifteenth path;
(n) means for detecting any photons on the fourteenth path;
(o) means for detecting any photons on the fifteenth path; and,
(p) a time delay system that comprises an optical gate controlled by a signal transmitted in a classical channel and an optical delay.
2. An apparatus as recited in claim 1 wherein at least one of the beam splitters has a reflectivity greater than 50%.
3. An apparatus as recited in claim 1 wherein at least one of the beam splitters has a reflectivity greater than about 90%.
4. An apparatus as recited in claim 1 wherein at least one of the beam splitters has a reflectivity greater than about 95%.
5. An apparatus as recited in claim 1 wherein at least one of the beam splitters has a reflectivity greater than about 99%.
6. An apparatus as recited in claim 1 wherein the photon is polarized.
7. An apparatus as recited in claim 6 wherein the photon is horizontally polarized.
8. An apparatus as recited in claim 1 wherein the means for selectively blocking photons comprises a switchable mirror.
US13/723,517 2012-12-21 2012-12-21 Method and apparatus for direct counterfactual quantum communication Active US8891767B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/723,517 US8891767B2 (en) 2012-12-21 2012-12-21 Method and apparatus for direct counterfactual quantum communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/723,517 US8891767B2 (en) 2012-12-21 2012-12-21 Method and apparatus for direct counterfactual quantum communication

Publications (2)

Publication Number Publication Date
US20140177837A1 US20140177837A1 (en) 2014-06-26
US8891767B2 true US8891767B2 (en) 2014-11-18

Family

ID=50974698

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/723,517 Active US8891767B2 (en) 2012-12-21 2012-12-21 Method and apparatus for direct counterfactual quantum communication

Country Status (1)

Country Link
US (1) US8891767B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10389525B2 (en) 2014-10-30 2019-08-20 Alibaba Group Holding Limited Method, apparatus, and system for quantum key distribution, privacy amplification, and data transmission
US10505724B2 (en) 2015-08-18 2019-12-10 Alibaba Group Holding Limited Authentication method, apparatus and system used in quantum key distribution process
US11489667B2 (en) * 2020-07-13 2022-11-01 First Quantum Inc. Method of correcting gravity-induced error in quantum cryptography system, method of quantum cryptography authentification using the same, and user terminal and server

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9794656B2 (en) * 2015-12-11 2017-10-17 Huawei Technologies Co., Ltd. Modular photonic switch architecture
CN107508677B (en) * 2017-10-18 2020-05-05 浙江工商大学 Safe multiparty quantum summation negotiation method based on quantum Fourier transform
KR101978774B1 (en) * 2017-10-20 2019-05-15 한국전자통신연구원 Quantum direct communication method based on user authentication and apparatus using the same
WO2019180770A1 (en) * 2018-03-19 2019-09-26 日本電気株式会社 Method and device for adjusting drive timing of photon detector, and optical communication system
WO2021038281A1 (en) * 2019-08-30 2021-03-04 Telefonaktiebolaget Lm Ericsson (Publ) A round-free cryptographic hashing device for secure and low-latency communications
CN112968735B (en) * 2021-02-09 2022-04-22 中国人民解放军国防科技大学 Anti-fact quantum communication chip

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7180645B2 (en) * 2003-04-01 2007-02-20 Canon Kabushiki Kaisha Quantum-state-generating apparatus, Bell measurement apparatus, quantum gate apparatus, and method for evaluating fidelity of quantum gate
US8149494B1 (en) * 2007-09-07 2012-04-03 The United States Of America As Represented By The Secretary Of The Navy Two-photon absorption switch having which-path exclusion and monolithic mach-zehnder interferometer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7180645B2 (en) * 2003-04-01 2007-02-20 Canon Kabushiki Kaisha Quantum-state-generating apparatus, Bell measurement apparatus, quantum gate apparatus, and method for evaluating fidelity of quantum gate
US8149494B1 (en) * 2007-09-07 2012-04-03 The United States Of America As Represented By The Secretary Of The Navy Two-photon absorption switch having which-path exclusion and monolithic mach-zehnder interferometer

Non-Patent Citations (17)

* Cited by examiner, † Cited by third party
Title
Avella et al. Report of proof-of-principle implementations of novel QKD schemes performed at INRIM. Poce. Of SPIE vol. 8542, 85421N, 2012. *
Ekert, Artur K., "Quantum Cryptography Based on Bell's Theorem," The American Physical Society, Physical Review Letters, vol. 67, No. 6, Aug. 5, 1991, pp. 661-663.
Elitzur, Avshalom C. et al., "Quantum Mechanical Interaction-Free Measurements," Foundations of Physics, vol. 23, No. 7, Jan. 2, 1993, pp. 987-997.
Gerhardt, Ilja et al., "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Communications, 2:349, DOI: 10.1038/ncomms1348, www.nature.com/naturecommunications, Jun. 14, 2011, 6 pages.
Hosten et al. "Counterfactual quantum comptation through quantum interrogation" Nature vol. 439, Feb. 2006. *
Huang et al. "Interaction and measurement-free quantum Zeno gates for universal computation with single-atom and single-photon qubits" The American Physical Society, Physical Review Letters, Jun. 2008. *
Kwiat et al. "Interaction-free measurement" The American Physical Society, Physical Review Letters, vol. 74, No. 24, Jun. 1995. *
Kwiat et al. "Quantum seeing in the dark" Scientific American Nov. 1996. *
Kwiat, P. G. et al, "High-Efficiency Quantum Interrogation Measurements via the Quantum Zeno Effect," The American Physical Society, Physical Review Letters, vol. 83, No. 23, Dec. 6, 1999, pp. 4725-4728.
Liu et al. "Experimental demonstration of counterfactual quantum communication" American Physical Society, Physicalo Review Letters, Jul. 2012. *
Lydersen, Lars et al., "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, Letters, vol. 4, Aug. 29, 2010, pp. 686-689.
Noh "Counterfactual-quantum cryptography" The American Physical Society, Physical Review Letters, Dec. 2009. *
Noh, Tae-Gon, "Counterfactual Quantum Cryptography," The American Physical Society, Physical Review Letters, vol. 103, 230501, Dec. 4, 2009, 4 pages.
Ren et al. "Experimental demonstration of counterfactual quantum key distribution" Laser Physics, vol. 21, No. 4, 2011, pp. 755-760. *
Ren M. et al., "Experimental Demonstration of Counterfactual Quantum Key Distribution," Laser Physics, vol. 21, No. 4, Mar. 4, 2011, pp. 755-760.
Wiesner, Stephen, "Conjugate Coding," Department of Physics, Columbia University, New York, 1983, 11 pages.
Wootters, W. K. et al., "A single quantum cannot be cloned," Nature Publishing Group, Letters to Nature, vol. 299, Oct. 28, 1982, pp. 802-803.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10389525B2 (en) 2014-10-30 2019-08-20 Alibaba Group Holding Limited Method, apparatus, and system for quantum key distribution, privacy amplification, and data transmission
US10505724B2 (en) 2015-08-18 2019-12-10 Alibaba Group Holding Limited Authentication method, apparatus and system used in quantum key distribution process
US11489667B2 (en) * 2020-07-13 2022-11-01 First Quantum Inc. Method of correcting gravity-induced error in quantum cryptography system, method of quantum cryptography authentification using the same, and user terminal and server

Also Published As

Publication number Publication date
US20140177837A1 (en) 2014-06-26

Similar Documents

Publication Publication Date Title
US8891767B2 (en) Method and apparatus for direct counterfactual quantum communication
Salih et al. Protocol for direct counterfactual quantum communication
Hu et al. Experimental quantum secure direct communication with single photons
Diamanti et al. Practical challenges in quantum key distribution
Takesue et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors
Kim Single-photon two-qubit entangled states: Preparation and measurement
Berlín et al. Experimental loss-tolerant quantum coin flipping
Ostermeyer et al. On the implementation of a deterministic secure coding protocol using polarization entangled photons
KR20200022627A (en) Apparatus and method for measurement immune quantum key distribution
US8184986B2 (en) Detection arrangement
He Simplified quantum bit commitment using single photon nonlocality
Wei et al. Feasible attack on detector-device-independent quantum key distribution
Mandal et al. Multi-photon implementation of three-stage quantum cryptography protocol
Morris et al. A survey of quantum key distribution (QKD) technologies
Ahn et al. High-dimensional single photon based quantum secure direct communication using time and phase mode degrees
US20240340091A1 (en) Encoder, decoder, systems and methods for d-dimensional frequency-encoded quantum communication and information processing
Alhussein et al. Monitoring coincident clicks in differential-quadrature-phase shift QKD to reveal detector blinding and control attacks
Ozhegov et al. Quantum key distribution over 300
El Rifai et al. Implementation of an m-ary three-stage quantum cryptography protocol
Nikhil Pradeep et al. Quantum cryptography protocols for IOE security: A perspective
Zhang Probabilistic direct counterfactual quantum communication
Jacak et al. Quantum key distribution security constraints caused by controlled quality of dark channel for non-entangled and entangled photon quantum cryptography setups
Rumyantsev et al. Modeling of quantum key distribution system for secure information transfer
Vybornyi et al. Backflash light as a security vulnerability in quantum key distribution systems
US11962689B2 (en) Quantum communications system having at least one waveplate to alter pulse polarization and associated methods

Legal Events

Date Code Title Description
AS Assignment

Owner name: THE TEXAS A&M UNIVERSITY SYSTEM, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZUBAIRY, MUHAMMAD SUHAIL;LI, ZHENGHONG;SIGNING DATES FROM 20121221 TO 20130211;REEL/FRAME:029931/0712

Owner name: KING ABDULAZIZ CITY FOR SCIENCE AND TECHNOLOGY, SA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AL-AMRI, MOHAMMAD D.;SALIH, HATIM A.;REEL/FRAME:029931/0912

Effective date: 20121227

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551)

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 8